Same here after Updating from 20.04 to 22.04 today:
[ 0.000000] Linux version 5.15.0-46-generic (buildd@lcy02-amd64-115) (gcc
(Ubuntu 11.2.0-19ubuntu1) 11.2.0, GNU ld (GNU Binutils for Ubuntu) 2.38)
#49-Ubuntu SMP Thu Aug 4 18:03:25 UTC 2022 (Ubuntu 5.15.0-46.49-generic 5.15.39)
[ 0.000000] Command line: BOOT_IMAGE=/boot/vmlinuz-5.15.0-46-generic
root=UUID=8eb2528b-9477-4dcd-b796-e38b25a16b14 ro console=tty1 console=ttyS0
...
[ 5.239998] unchecked MSR access error: WRMSR to 0x48 (tried to write
0x0000000000000004) at rIP: 0xffffffffbbe960f4 (native_write_msr+0x4/0x30)
[ 5.242224] Call Trace:
[ 5.242228] <TASK>
[ 5.242229] ? write_spec_ctrl_current+0x45/0x50
[ 5.242240] speculation_ctrl_update+0x8f/0x200
[ 5.245439] speculation_ctrl_update_current+0x1f/0x30
[ 5.246406] ssb_prctl_set+0x9a/0xf0
[ 5.247183] arch_seccomp_spec_mitigate+0x66/0x70
[ 5.248195] seccomp_set_mode_filter+0x4e2/0x530
[ 5.249094] do_seccomp+0x37/0x200
[ 5.249829] __x64_sys_seccomp+0x18/0x20
[ 5.250614] do_syscall_64+0x5c/0xc0
[ 5.251371] ? exit_to_user_mode_prepare+0x37/0xb0
[ 5.252268] ? irqentry_exit_to_user_mode+0x9/0x20
[ 5.253181] ? irqentry_exit+0x1d/0x30
[ 5.253932] ? exc_page_fault+0x89/0x170
[ 5.254714] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 5.255633] RIP: 0033:0x7fd9bf82ca3d
[ 5.256398] Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89
f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01
f0 ff ff 73 01 c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
[ 5.259150] RSP: 002b:00007fff2d4c0f88 EFLAGS: 00000246 ORIG_RAX:
000000000000013d
[ 5.260339] RAX: ffffffffffffffda RBX: 00005604b1701620 RCX: 00007fd9bf82ca3d
[ 5.261476] RDX: 00005604b16fc390 RSI: 0000000000000000 RDI: 0000000000000001
[ 5.262605] RBP: 0000000000000000 R08: 0000000000000001 R09: 00005604b16fc390
[ 5.263780] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000
[ 5.264940] R13: 0000000000000001 R14: 00005604b16fc390 R15: 0000000000000001
[ 5.266076] </TASK>
Starting [0;1;39mJournal Service[0m...
[ 5.267097] Call Trace:
[ 5.267721] <TASK>
[ 5.268288] ? write_spec_ctrl_current+0x45/0x50
[ 5.269123] __switch_to_xtra+0x110/0x4e0
[ 5.269919] __switch_to+0x260/0x450
[ 5.270658] __schedule+0x23d/0x590
[ 5.271400] ? __do_softirq+0x27f/0x2e7
[ 5.272180] schedule+0x4e/0xc0
[ 5.272891] smpboot_thread_fn+0xff/0x160
[ 5.273696] ? smpboot_register_percpu_thread+0x140/0x140
[ 5.274655] kthread+0x12a/0x150
[ 5.275366] ? set_kthread_struct+0x50/0x50
[ 5.276170] ret_from_fork+0x22/0x30
[ 5.276930] </TASK>
[ 5.278397] Call Trace:
Cloud provider is https://www.ip-exchange.de/, based on OpenStack.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1973839
Title:
5.15.0-30-generic : SSBD mitigation results in "unchecked MSR access
error: WRMSR to 0x48 (tried to write 0x0000000000000004)" and flood of
kernel traces in some cloud providers
Status in linux package in Ubuntu:
Confirmed
Bug description:
When booting this in one of our clouds, we see an error early in the
kernel output
kernel: unchecked MSR access error: WRMSR to 0x48 (tried to write
0x0000000000000004) at rIP: 0xffffffffabc90af4
(native_write_msr+0x4/0x20)
and then an un-ending stream of "bare" tracebacks; which I think must
be related
[ 2.285717] kernel: Call Trace:
[ 2.285722] kernel: <TASK>
[ 2.285723] kernel: ? speculation_ctrl_update+0x95/0x200
[ 2.292001] kernel: speculation_ctrl_update_current+0x1f/0x30
[ 2.292011] kernel: ssb_prctl_set+0x92/0xe0
[ 2.292016] kernel: arch_seccomp_spec_mitigate+0x62/0x70
[ 2.292019] kernel: seccomp_set_mode_filter+0x4de/0x530
[ 2.292024] kernel: do_seccomp+0x37/0x1f0
[ 2.292026] kernel: __x64_sys_seccomp+0x18/0x20
[ 2.292028] kernel: do_syscall_64+0x5c/0xc0
[ 2.292035] kernel: ? handle_mm_fault+0xd8/0x2c0
[ 2.299617] kernel: ? do_user_addr_fault+0x1e3/0x670
[ 2.312878] kernel: ? exit_to_user_mode_prepare+0x37/0xb0
[ 2.312894] kernel: ? irqentry_exit_to_user_mode+0x9/0x20
[ 2.312905] kernel: ? irqentry_exit+0x19/0x30
[ 2.312907] kernel: ? exc_page_fault+0x89/0x160
[ 2.312909] kernel: ? asm_exc_page_fault+0x8/0x30
[ 2.312914] kernel: entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 2.312919] kernel: RIP: 0033:0x7fcffd6eaa3d
[ 2.312924] kernel: Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e
fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05
<48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
[ 2.312926] kernel: RSP: 002b:00007ffe352e2938 EFLAGS: 00000246 ORIG_RAX:
000000000000013d
[ 2.312930] kernel: RAX: ffffffffffffffda RBX: 0000557d99d0c0c0 RCX:
00007fcffd6eaa3d
[ 2.319941] systemd[1]: Starting Load Kernel Module configfs...
[ 2.320103] kernel: RDX: 0000557d99c01290 RSI: 0000000000000000 RDI:
0000000000000001
[ 2.339938] kernel: RBP: 0000000000000000 R08: 0000000000000001 R09:
0000557d99c01290
[ 2.339941] kernel: R10: 0000000000000001 R11: 0000000000000246 R12:
0000000000000000
[ 2.339942] kernel: R13: 0000000000000001 R14: 0000557d99c01290 R15:
0000000000000001
[ 2.339947] kernel: </TASK>
We never see any more warnings or context for the tracebacks, but they
just keep coming over and over, filling up the logs. This is with a
jammy x86_64 system running 5.15.0-30-generic
Unfortunately I don't exactly know what is behind it on the cloud
side.
There seem to be several bugs that are similar but not exactly the
same
https://bugzilla.redhat.com/show_bug.cgi?id=1808996
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1921880
The gist seems to be that 0x4 refers to SSBD mitigation and something
about the combo of some versions of qemu and a Jammy guest kernel make
the guest unhappy. I will attach cpuid info for the guest.
I installed the 5.17 kernel from the mainline repository, and this
appears to go away. I will attempt to bisect it to something more
specific.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1973839/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp